CrowdStrike: Attackers focusing on cloud exploits, data theft

CrowdStrike’s new threat report sees a big increase in data theft activity, as attackers move away from ransomware and other malware attacks, as defense gets better, and the value... Read more »

This 18-course ethical hacking bundle is under $50

Ethical hacking is a great skill to learn with new cyber threats on the rise. Learn how to fight back with this ethical hacking course bundle. The post This... Read more »

New National Cybersecurity Strategy: resilience, regs, collaboration and pain (for attackers)

The Biden administration’s National Cybersecurity Strategy aims to go after attackers, cultivate a resilience-first defensive posture and build public, private and international collaboration. The post New National Cybersecurity Strategy:... Read more »

LastPass releases new security incident disclosure and recommendations

LastPass attacks began with a hacked employee’s home computer. The investigation now reveals the password manager company’s data vault was compromised. The post LastPass releases new security incident disclosure... Read more »

Top 10 open-source security and operational risks of 2023

Many software companies rely on open-source code but lack consistency in how they measure and handle risks and vulnerabilities associated with open-source software, according to a new report. The... Read more »

Google Workspace admins can now use client-side encryption on Gmail and Calendar

Organizations subject to government regulations can gain more control over their own security. The post Google Workspace admins can now use client-side encryption on Gmail and Calendar appeared first... Read more »

1Password is looking to a password-free future. Here’s why

With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to ‘eliminate’ passwords entirely. The post 1Password is looking to a password-free future.... Read more »

Pen testing report: IT budgets should focus on entire security stack

With nearly 90% of companies reporting cyberattacks, pen testing budgets are on the rise, with cloud infrastructure and services a key focus area, according to a new report. The... Read more »

Digital forensics and incident response: The most common DFIR incidents

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. The post Digital forensics and incident response: The most common DFIR... Read more »

Transmission of sensitive data policy

Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the... Read more »
Subscribe to our Newsletter